Refer to the exhibit.

You have been tasked with replacing the managed switch Forti Switch 2 shown in the topology.
Which two actions are correct regarding the replacement process? (Choose two.)
c) The antivirus database queries FortiGuard with the hash of a scanned file. This is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with the hash of a scanned file, and FortiGuard returns a list of known malware signatures that match the hash.
e) The hash signatures are obtained from the FortiGuard Global Threat Intelligence database. This is where the FortiGuard VOS service gets its hash signatures from. The FortiGuard Global Threat Intelligence database is updated regularly with new malware signatures.
Kattie
3 months agoGregg
3 months agoRashida
3 months agoKarl
4 months agoEffie
4 months agoSharee
4 months agoChauncey
4 months agoWeldon
4 months agoKaitlyn
5 months agoNatalie
5 months agoTijuana
5 months agoTemeka
5 months agoSharen
5 months agoJennifer
5 months agoMakeda
5 months agoFatima
9 months agoJeffrey
9 months agoAnnelle
8 months agoTennie
8 months agoArlean
8 months agoAzzie
8 months agoDylan
10 months agoAnglea
8 months agoKristel
8 months agoBeatriz
9 months agoGail
10 months agoKeva
9 months agoJanine
10 months agoGalen
10 months agoTerrilyn
10 months agoBrent
11 months agoWilliam
11 months agoBrent
11 months ago